The Suite REST API in VMware vRealize Operations (aka vROps) 6.x before 6.4.0 allows remote authenticated users to write arbitrary content to files or rename files via a crafted DiskFileItem in a relay-request payload that is mishandled during deserialization.
Published 2016-12-29 09:59:01
Updated 2017-07-28 01:29:06
Source VMware
View at NVD,   CVE.org

Exploit prediction scoring system (EPSS) score for CVE-2016-7462

Probability of exploitation activity in the next 30 days: 0.24%

Percentile, the proportion of vulnerabilities that are scored at or less: ~ 61 % EPSS Score History EPSS FAQ

CVSS scores for CVE-2016-7462

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source
7.5
HIGH AV:N/AC:L/Au:S/C:N/I:P/A:C
8.0
7.8
NIST
8.5
HIGH CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H
3.1
4.7
NIST

CWE ids for CVE-2016-7462

  • Assigned by: nvd@nist.gov (Primary)
  • The product provides an Applications Programming Interface (API) or similar interface for interaction with external actors, but the interface includes a dangerous method or function that is not properly restricted.
    Assigned by: nvd@nist.gov (Primary)

References for CVE-2016-7462

Products affected by CVE-2016-7462

This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!